Cryptix Logo

Resources

News Docs Products Resources Support Feedback  

On this page we try to maintain a list of interesting webpages and books. If you have a suggestion or correction, please send it to the webmaster.

If you click on a book's title you will be taken to the Amazon.com website, where you can find more information and/or buy the book. Cryptix receives a small fee for every book sold through a link on this webpage. Curious how we deal with those Amazon cheques? Look here...


Advanced Encryption Standard (AES)

AES Homepage
The starting point for information on AES.
Brian Gladman's Page on AES
The fastest AES implementations in C/C++, including speed comparisons.
Live from the Second AES Conference
Long Dejanews thread about AES.
MARS, RC6, Rijndael, Serpent, Twofish
The AES candidate algorithms.

Algorithms

Blowfish
CAST, CAST5, CAST-128, CAST-256
CRYPTON
DEAL
DFC
DSA
E2
IDEA
KEA
LOKI97
MARS
MD2
MD4
MD5
RC4
RC5
RC6
RIPEMD-128, RIPEMD-160
SHA-1
SKIPJACK
Square
SRP
Tiger
TEA
Twofish
The Block Cipher Lounge

Elliptic Curve Cryptography (ECC)

Certicom's ECC Tutorials and Whitepapers
Interesting set of tutorials for the ECC layman
Elliptic Curves and Elliptic Functions
Short introduction to Elliptic Curves
IEEE P1363 Working Group
P1363: Standard Specifications For Public Key Cryptography.
Book Icon Elliptic Curve Public Key Cryptosystems
This is likely to be the most traditional reference work on elliptic curve cryptography for its wide coverage of the subject, and as such could be compared to the role of Bruce Schneier's "Applied Cryptography" in general cryptography issues. (Alfred Menezes, Kluwer Academic Pub (1993), ISBN 0 792 39368 6)
Book Icon Implementing Elliptic Curve Cryptography
This book book reports on the author's experience in implementing a fairly complete EC library written in C, and is rated beginner to intermediate level -- a good place for a programmer to start studying ECC. (Michael Rosing, Manning Publications Company (1998), ISBN 1 884 77769 4)
Book Icon Finite Fields
Excellent book for anyone trying to understand and implement arithmetic over GF(q). (Rudolf Lidl & Harald Niederreiter, Cambridge University Press (1997), ISBN 0 521 39231 4.)
Book Icon The Arithmetic of Elliptic Curves
The main (if not the only one) reference book about critical aspects of elliptic curves as isogenies and the point-counting problem. (Joseph H. Silverman, Springer-Verlag (1986), ISBN 0 387 96203 4.)

General

ASN.1 Information Site
ASN.1 Information Site
Selecting Cryptographic Key Sizes
A model which determines adequate key sizes for all popular cryptosystems.
RSA Labs' Crypto FAQ
This FAQ covers the technical mathematics of cryptography as well as export law and basic fundamentals of information security.
Snake Oil Warning Signs: Encryption Software to Avoid
It is difficult to distinguish bad crypto from the Real Thing: all encryption utilities produce garbled output. The purpose of this document is to present some simple "red flags" that can help you detect bad crypto.
USENET sci.crypt FAQ
Frequently Asked Questions (with answers) for the USENET sci.crypt newsgroup. Read this before you post.
USENET sci.crypt.reasearch FAQ
Frequently Asked Questions (with answers) for the USENET sci.crypt.research newsgroup. Read this before you post.
Book Icon Applied Cryptography 2nd Edition [ Hardcover | Paperback ]
Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. (Bruce Schneier, John Wiley & Sons (October 1995), ISBN: 0471128457)
Book Icon Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
If you are interested in the mathematics behind cryptography, this book is for you. It includes extensive exercises with each chapter and makes an ideal introduction for any math-literate person willing to get acquainted with this material. (Douglas R. Stinson, CRC Press (March 1995), ISBN: 0849385210)
Book Icon Handbook of Applied Cryptography [ Online version ]
This book provides what is probably the best, up to date survey of the field of cryptography. The book is more academically rigourous than Bruce's Applied Cryptography but may be rather tough going for those wanting a more introductory book. (Alfred J. Menezes et al., CRC Press (October 1996), ISBN: 084938523)
Book Icon The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet
An updated and revised history of codes offers new information on techniques used to break machine and computer ciphers, as well as the speculation of scientists on how messages from outer space might be solved and a study of the use of codes during the Vietnam War. (David Kahn, Scribner (December 1996), ISBN: 0684831309)

Java

Jikes
Fast, standards compliant, open source. The only decent Java compiler in existence. Use it and you will never switch back to javac.

Legal

Bert-Jaap Koops' Crypto Law Survey
The survey of crypto regulations world-wide.
Simone van der Hof's Digital Signature Law Survey
The survey of digital signature regulations world-wide.

Libraries (Java and other languages)

cryptlib (C/C++)
cryptlib is a powerful security toolkit which allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. The high-level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details which make the encryption or authentication work. Because of this, cryptlib dramatically reduces the cost involved in adding security to new or existing applications.
Cryptographic Libraries: A comparison (outdated)
IAIK (Java)
OpenJCE
OpenSSL (C/C++)
The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
PureTLS (Java)
An SSL/TLS implementation in Java. Written in the US but some versions are available from ftp://ftp.zedz.com/pub/crypto/crypto/LIBS/java/.
Zedz Consultants: FTP Archive of Crypto Libraries
Formerly Replay Associates, this archive contains copies of hundreds of crypto libraries, tools and applications.

PGP and OpenPGP

International PGP Home Page
Network Associates (formerly PGP Inc.)
Network Associates International (formerly PGP International)
RFC 2440: OpenPGP Message Format
Updated version of RFC 2440
 
   
 
  Copyright © 1995-2000 The Cryptix Foundation Limited. All rights reserved.
Cryptix is a trademark of The Cryptix Foundation Limited.
Problems with this website? Send mail to webmaster@cryptix.org.
Revision 1.30, last updated 2000/05/03 11:04:38 by edwin. This page is Valid HTML 4.0!